From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 41 06 c8
4106c84a556219ebc297bc92c5997b12f5154a6b 4106c85d02d828689f6aeb3b2a4b67c63fc297d9 4106c8fb0ec0a0c8ba55c2a3575af08df9ffcceb